Rewired by Ellis Ryan.;Mohan Vivek K.; & Vivek Mohan
Author:Ellis, Ryan.;Mohan, Vivek K.; & Vivek Mohan [Неизв.]
Language: eng
Format: epub
ISBN: 9781119085171
Publisher: John Wiley & Sons, Inc.
Published: 2019-05-07T00:00:00+00:00
9.2 The Conficker Infection
On 23 October 2008, during the eighth annual meeting of the International Botnet Task Force, Microsoft released an out‐of‐band emergency security patch. The patch fixed a Windows vulnerability that could allow malware to spread between unprotected machines without any user interaction.6 While releasing an emergency patch cast a spotlight on the vulnerability, Microsoft had already seen the flaw exploited in the wild. On 22 November a month after the patch's release, a new piece of highly contagious malware – the Conficker worm – was first detected. In response, Microsoft issued a security alert recommending that people immediately patch their systems.
For the most part, Conficker A (as it would come to be called) simply hid in a computer's background activity. When it was time to call home for instructions, however, the worm would contact 250 pseudorandomly generated domains spread out across 5 TLDs. Behind any of those domains, the creators of the worm could be waiting to issue commands. A few weeks later, a more sophisticated variant called Conficker B appeared; this variant could propagate via thumb drives, disable Windows Automatic Update, block certain DNS look‐ups, and call domains from eight TLDs.7 While these strategies were not new, it was unusual for so many features to be packed into a single piece of malware. More than one researcher described it as “elegant.”8 By the end of 2008, SRI International estimated that between 1 and 1.5 million computers were infected.9 Over the next five months, three additional versions of the worm would be introduced. At its peak in 2009, the Conficker botnet grew to between 5 and 13 million machines.10
While Microsoft's release of an emergency patch signaled that the vulnerability was particularly dangerous, in general, the cybersecurity community was slow to recognize the scope of the problem. While the worm was discussed with increased frequency on a number of cybersecurity e‐mail lists in late 2008,11 there was little organized activity within the private sector to control the spread of the worm until early 2009. Governments, meanwhile, were entirely absent from the discussion. The security firm Qualys estimated that two months after the emergency patch was released, 30% of computers running Windows remained unpatched.12
A small number of security experts, who would later call themselves the CWG, did notice that Conficker threatened the internet at large. Shortly after the worm's appearance, they began to study the worm and devise ways to control it. Early members of the all‐volunteer CWG, many of who knew each other from conferences and social media, included representatives of Microsoft, SRI International, and several companies that managed TLDs, as well as a number of independent security researchers and academics. Relatively quickly, they discovered that the domain names which could be used for command and control communications were not random. By running the domain name generation algorithm for a future date, the group could identify the domains that would be called and register the names themselves (often with personal credit cards) before the worm's creators could use them for passing the botnet instructions.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
The Mikado Method by Ola Ellnestam Daniel Brolund(25284)
Hello! Python by Anthony Briggs(24338)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(23431)
Kotlin in Action by Dmitry Jemerov(22510)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(21972)
Dependency Injection in .NET by Mark Seemann(21842)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(20709)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(19522)
Grails in Action by Glen Smith Peter Ledbrook(18605)
Adobe Camera Raw For Digital Photographers Only by Rob Sheppard(17032)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(15843)
Secrets of the JavaScript Ninja by John Resig & Bear Bibeault(13690)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(11853)
Jquery UI in Action : Master the concepts Of Jquery UI: A Step By Step Approach by ANMOL GOYAL(11151)
A Developer's Guide to Building Resilient Cloud Applications with Azure by Hamida Rebai Trabelsi(10621)
Hit Refresh by Satya Nadella(9198)
The Kubernetes Operator Framework Book by Michael Dame(8570)
Exploring Deepfakes by Bryan Lyon and Matt Tora(8400)
Robo-Advisor with Python by Aki Ranin(8360)